Top Banner

of 26

Thayer Asymmetric Threat & Southeast Asia

May 30, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    1/26

    Introduction to Asymmetric Threat

    Carlyle A. Thayer*

    [Paper to The Incorporation of Asymmetric Threats in Five Power Defence Arrangements (FPDA)Training Activities, Fourth FPDA Professional Forum, co-hosted by Australia and Malaysia,Crown Princess Hotel, Kuala Lumpur, Malaysia, October 20-22, 2003]

    I would like to start by thanking the co-hosts for the invitation to address you today. It is

    indeed an honour for me to be here.

    I would also like to enter the standard caveat that I am speaking in my personal capacity

    and that my views do not represent the official policy or position of my employer.

    My aim today is to provide a general introduction to asymmetric threat as a foundation

    for you to meet the Professional Forums objective of exploring how the Five Power

    Defence Arrangements might adapt to address asymmetric threat in training activities.

    My presentation is divided into four parts: asymmetric threat, asymmetric threat and

    Southeast Asia, the Five Power Defence Arrangements (FPDA) and asymmetric threat,

    and a conclusion.

    I. Asymmetric Threat

    When I was first approached about this topic I conducted a search of the Internet. The

    key words asymmetric threats generated 8,310 hits, while the related key words

    asymmetric warfare generated 11,600 hits. I will, of course, summarise this enormous

    literature in the next 40 minutes.

    *Carlyle A. Thayer is Deakin Universitys On Site Academic Coordinator at the Centre for Defence and

    Strategic Studies (CDSS) at the Australian Defence College. He is currently on secondment from the

    Australian Defence Force Academy where he holds a personal chair as Professor of Politics.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    2/26

    2

    A review of the literature provides the following conclusions: there is no agreed

    definition of the term asymmetric threat, and asymmetric warfare is as old as warfare

    itself. Weaker opponents have always sought to neutralize their enemys technological or

    numerical superiority by fighting in ways or on battlefields that nullify it.1

    One writer argues that the term is nonsense because it implies a dichotomy - symmetry

    on the one side and asymmetry on the other.2

    I do not find it surprising that there is no agreed definition. Asymmetric threat is a

    contested term. That is what we academics do best. We invent terms and then argue

    endlessly over (or contest) the meaning of these new terms.

    Definition

    Let me table for your consideration the following definition coined by Colin Gray of the

    University of Reading, asymmetric threats are those that our political, strategic and

    military cultures regard as unusual.3

    Let me repeat: asymmetric threats are those that our political, strategic and military

    cultures regard as unusual. I think this definition is pertinent because of the multinational

    nature of the Five Power Defence Arrangements which brings together different

    political, strategic and military cultures.

    Asymmetric threats are unusual in at least nine ways.4 They are:

    Unconventional

    Irregular in that they are posed by instruments (non-state actors) unrecognized by

    laws of war

    1Vincent J. Goulding, Back to the Future with Asymmetric Warfare, Parameters, Winter 2000-01, 21.

    2Colin S. Gray, Thinking Asymmetrically in Times of Terror, Parameters, Spring 2002, 5 and 14.

    3Gray, Thinking Asymmetrically in Times of Terror, 5.

    4Adapted from Gray, Thinking Asymmetrically in Times of Terror, 5-6.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    3/26

    3

    Unmatched by current military capabilities and plans Highly leveraged against particular assets, civil more than military Designed to work around, offset and negate current strengths Difficult to respond to in kind Difficult to respond to in a discriminate and proportionate manner Raise the prospect of the unknown unknown. We do not look for what we do not

    know to look for.

    Difficult to deterThe asymmetric threats of concern are those that do regional FPDA members, Malaysia

    and Singapore, hard to their interests.

    Asymmetric Warfare

    Now let me turn to the allied term asymmetric warfare. Asymmetric warfare is a broad

    and inclusive term coined to recognize that two sides in a conflict may have such

    drastically different strengths and weaknesses that they resort to drastically different

    (asymmetric) tactics (or strategies or methods of warfare and conflict) to achieve relative

    advantage including attacks on civilians. In other words, asymmetric warfare may be

    defined as any conflict deviating from the norm, or an indirect approach to affect a

    counter-balancing of force.5

    5David L. Grange, Asymmetric Warfare: Old Method, New Concern,National Strategy Forum Review,

    Winter 2000, 1.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    4/26

    4

    Traditionally, since the emergence of the Westphalian system of states, warfare was

    conducted on a state versus state basis. Asymmetry is not just the province of the weak;

    asymmetry may also be exploited by the strong.6

    It is not my intention here to go into a detailed narrative of the history of modern warfare.

    But I would like to introduce the idea that as warfare has evolved we may identify at least

    four generations of warfare:7

    First-generation warfare was characterized by close-order formations armed with guns to

    repel sword and bayonet cavalry and infantry.

    Second generation warfare was characterized by the use of mass firepower and its

    effective management through a conflict of attrition.

    Third generation warfare is characterized by the use of decentralized attacks against

    second generation armies with the defender often the winner by virtue of being able to

    wear the attacker down.

    Fourth generation warfare is highly irregular and consists of asymmetric operations in

    which a vast mismatch exists between the resources and philosophies of the combatant.

    Emphasis is placed on bypassing an opposing military force and striking directly at

    cultural, political or population targets

    In the contemporary world state on state conflict has receded in scope and intensity.

    Conflict today is more likely to be between a state and a non-state actor. Non-state actors

    or fourth generation warriors (4GW) comprise non-national and trans-national groups

    that form on the basis of ideology, religion, tribe, culture, zealotry, and illegal economic

    6Gary Eason, Analysis: Asymmetric Warfare, BBC News Online, April 1, 2003 citing U.S. Brig. General

    Vincent Brooks.7Jason Vest, Fourth-generation warfare, The Atlantic Monthly Online, December 2001, 2 and Center for

    Defense Information, Reshaping the Military for Asymmetric Warfare, CDI Terrorism Project, October 5,

    2001, 2.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    5/26

    5

    activities. Through decentralized attacks on markets, communications and cultural icons

    and the use of information warfare they have pushed many regions of the world into

    anarchy.8

    Non-state actors are difficult to target and engage by conventional means.9

    Non-state

    actors may not wear distinctive uniforms so as to be hard to tell apart from the local

    community. They have shown themselves willing to fight and die for their causes, most

    notably by employing the tactic of suicide bombers. Non-state actors are not constrained

    by conventional norms and international law. They employ new and innovative means to

    achieve their objectives.

    In responding to the challenge of fourth generation warriors the military element of

    national power, however crucial, is not the decisive factor. Non-state actors cannot be

    easily decimated by conventional means. High-tech standoff warfare is largely ineffective

    as well.10 Indeed, the overwhelming use of force (being seen as too successful), or a

    disproportionate use of force against non-state actors may produce a backlash.

    Conflict provoked by non-state actors has no quick fix solutions. Instead non-state actors

    must be confronted by a combination of military, economic, diplomatic, political and

    cultural elements of national power designed to erode their support base. In addition,

    states must often cooperate with neighbours and friends more distant to degrade the

    logistic, recruitment and communications bases of non-state actors.

    I would now like to turn to a discussion of asymmetric threats and Southeast Asia.

    8Grange, Asymmetric Warfare: Old Method, New Concern 2.

    9Vest, Fourth-generation warfare, 2 citing Franklin C. Spinney, Donald Vandergriff and John Sayen,

    Spirit, Blood and Treasure: The American Cost of Battle in the 21st

    Century.10

    Grange, Asymmetric Warfare: Old Method, New Concern 3.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    6/26

    6

    II. Asymmetric Threats and Southeast Asia

    In many respects asymmetric threats are not a new phenomenon in post-independent

    Southeast Asia. Almost every state in the region has experienced some form of violent

    domestic challenge to the legitimacy of the state. These challenges have arisen from pro

    and anti communist insurgencies as well as ethnic, religious and regional separatist

    groups or movements seeking to establish an Islamic state. Communist insurgencies

    succeeded in Indochina (Vietnam, Laos and Cambodia) but failed in the Philippines,

    Malaysia, Burma, Indonesia and Thailand. All of these states were characterized by low

    levels of economic development. This has meant that the most important security

    challenges to the state have been internal. This has had an important impact on national

    security and defence doctrine as we shall see below.

    But there have been several state on state conflicts, notably between North and South

    Vietnam, Indonesia and Malaysia (Konfrontasi), and Vietnam and Cambodia.

    Changing Concepts of Security

    As we move through history from the end of the Second World War through the Cold

    War to the present post-Cold War era it is notable that our conception of what constitutes

    security has expanded. Traditionally national security was defined in terms of state or

    regime security from threats by other state actors. This meant the military element of

    national power played a dominant role in national security policy. Alliances were formed

    to provide collective security.

    The notion of national security in Southeast Asia, as I have noted, has always been

    predominantly internal in orientation. In our region the traditional paradigm of national

    security was altered by the adoption of a new paradigm called comprehensive security.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    7/26

    7

    During the 1970s and mid-1980s, Indonesia and Malaysia both enunciated doctrines of

    comprehensive security. Let me provide a brief overview of each country:

    In 1973 Indonesias National Defence Board drew up a Guideline for State Policy which

    borrowed from the doctrine of Total Peoples Defense and Security. The 1973 Guideline

    identified economic development as Indonesias top priority and introduced the concept

    of national resilience. The Guideline also spelled out a comprehensive multidimensional

    approach to security that included ideological, political, economic, socio-cultural and

    security-defense. Later Indonesia enunciated the concept of regional resilience embracing

    membership in the Association of South East Asian Nations (ASEAN) and endorsing the

    concepts of a Zone of Peace Freedom and Neutrality (ZOPFAN) and a nuclear weapons

    free zone in Southeast Asia.

    During the 1980s the term comprehensive security crept into Malaysias political

    vocabulary. In March 1984, for example, Datuk Musa Hitam spoke of Malaysias

    doctrine of comprehensive security. Two years later, Prime Minister Mahathir stated that

    security is not just a matter of military capability and national security is inseparable

    from political stability, economic success and social harmony. In July 1986, former

    prime minister Tun Hussein Onn noted in a speech: national security is dependent on the

    satisfaction of two very basic conditions. First, there must be a tolerable level of harmony

    between individual security, group security and national security Second, our external

    environment must be made conducive and supportive of internal political and

    socioeconomic development [problems facing Malaysia] traverse political, socio-

    cultural, psychological and economic dimensions thus emphasizing the total or

    comprehensive nature of Malaysias national security.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    8/26

    8

    Let me note briefly that Japan adopted a doctrine of comprehensive security in the late

    1970s. The doctrine of common security made its appearance in Europe in the early

    1980s, while Canada advanced the notion of cooperative security nearly a decade later.

    The final security paradigm that I would like to mention is that of human security. The

    end of the Cold War, rapid economic growth in a number of countries, and the spread of

    global communications, has resulted in what Samuel Huntington has called a Third

    Wave of democratization in the Philippines, Taiwan, South Korea, Mongolia, Thailand,

    Indonesia and Cambodia. Many of these transitions to democracy have not yet been

    consolidated. The point I am trying to make is that economic growth has resulted in the

    emergence of a middle class and what is termed civil society. Civil society refers to the

    emergence of a wide variety of local groups that are autonomous from the state, including

    non-government organizations (NGOs). These associations embrace a wide variety of

    issues but are most prominent for their advocacy of civil and human rights. This

    development has led to the emergence of the latest security paradigm that of human

    security.

    Up until this point my entire presentation has implied that the state is a legitimate

    political form and that violent challenges to its authority are illegitimate. But what about

    the case of totalitarian states like that of the Khmer Rouge, or authoritarian states such as

    Suhartos New Order that decimated the Communist Party of Indonesia and its supporters

    and sympathizers? What about repressive military regimes in Burma and Thailand? Is it

    legitimate to take up arms against these states?

    Advocates of human security argue that the duty of the state is to provide for the security

    of all its citizens from threats of all kinds, such as state violence, not just external military

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    9/26

    9

    threats. Human security is concerned the totality of factors that can affect the well being

    of all individuals women and men, the aged and the young, ethnic minorities, poor and

    rich. Human security is generally focused on multiple risks arising from economic

    insecurity, environmental threats, social disintegration, and human processes such as

    large-scale refugee movements and pandemics. The advocates of human security argue

    that international organizations such as the United Nations as well as local community

    groups should be involved in providing human security in complex humanitarian

    emergencies. Rizal Sukuma, an influential advisor in Indonesia, has written, an ASEAN

    Security Community should balance its concern over state security with a greater

    emphasis on human security.11

    To sum up, the theme I have been trying to develop is: our conceptualization of national

    security has enlarged over the past five decades from security against external aggression

    to common security, comprehensive security, cooperative security and human security.

    While the role of the military still remains central for the provision of national defence,

    the expanded definition of security has resulted in the involvement of many more

    government departments and agencies than before. In some cases, the armed forces have

    been assigned to carry out non-traditional tasks as part of a countrys approach to

    providing comprehensive security. This may have implications for regional members of

    the FPDA.

    Transnational Threats

    Our conceptualization of what constitutes a challenge or a threat to security has also

    undergone a similar redefinition. These new security threats are mainly transnational in

    11Rizal Sukma, The Future of ASEAN: Towards a Security Community, Paper presented to the seminar

    on ASEAN Cooperation: Challenges and Prospects in the Current International Situation, New York, June

    3, 2003, 4.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    10/26

    10

    nature and are generated primarily by non-state actors. The list of what constitutes a

    transnational threat to security is ever enlarging. But for our purposes let me identify the

    most prominent: illegal drug smuggling, trafficking in small arms, people smuggling (for

    slavery, sexual slavery), illegal migration, environmental pollution and terrorism. It is

    notable that several transnational threats are found together in conflict zones.

    The non-state actors involved include warlords, criminal gangs, criminal syndicates, and

    terrorist groups. In some instances non-state actors may receive the support of a rogue

    state or support from one state organization, such as the military or intelligence service.

    The activities of non-state actors often overlap and there is a close connection between

    criminals, black marketers, drug lords, arms dealers, zealots and terrorists.12

    Transnational threats by definition affect more than one state and are generally beyond

    the capacity of any one state to address. For example, no one country can effectively halt

    the illegal drug trade originating in Afghanistan or the Golden Triangle in Southeast Asia.

    Transnational security challenges increasingly require an interagency approach at

    national level and cooperative efforts internationally. Non-state actors attempt to exploit

    the seams where different agencies come together.

    Some critics have argued that the inclusion of transnational threats in our definition of

    security has so stretched the concept of security that it has become meaningless from a

    defence point of view. Or to express this objection more colourfully, you cant stop

    HIV/AIDS from spreading by putting a condom on your bayonet.

    I would argue that the broadening definition of what constitutes security has implications

    for the armed forces of each country, both domestically and externally. Transnational

    12Grange, Asymmetric Warfare: Old Method, New Concern 4.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    11/26

    11

    threats, to use an expression coined by Lt. Gen. Hank Stackpole, the president of the Asia

    Pacific Center for Security Studies in Hawaii, is like rust eating away at the fabric of

    society. Transnational threats threaten the legitimacy of a state by undermining the rule

    of law and good governance. Warlords and criminals corrupt state officials (politicians,

    police and the judiciary) through bribery. Not so long ago the nexus between drug

    traffickers and Cambodian officials led to that country being called a narco-state.

    The professionalism of the military may be undermined by its involvement in money-

    making activities such as providing protection, marijuana production, illegal timber

    exports, smuggling and the sale of weapons and equipment to non-state actors.

    Transnational threats divert and consume resources that could be put to better purposes.

    This undermines the capacity of the state to efficiently meet the needs of its citizens. The

    combined effects of these forces may serve to weaken a state to the point where it

    becomes a failing or failed state. Non-state actors take advantage of weak or failing states

    for refuge and they exploit the discontent of the local population for support. Weak,

    failing and failed states negatively impact on their neighbours and the neighbourhood.

    Finally, to round off this discussion of transnational threats and security, nothing I have

    said is meant in any way to suggest that armed forces or the military have no utility in the

    new security environment. While the post-Cold War security situation in Latin America

    led one country to disband its military entirely, the security environment in Southeast

    Asia is not so conducive. There are a number of unresolved territorial and maritime

    boundary disputes. I would not go so far as to argue that there is an arms race in the

    region; but I would submit that the arms procurement policies of some states have led to

    the introduction of what could be considered offensive platforms. At the very least there

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    12/26

    12

    is no effective arms control regime in Southeast Asia. There is still disagreement in the

    region about the long-term implications of Chinas rising military power. And finally,

    some non-state actors are continually at war with the state and violence is a way of

    life.13

    Several states, such as Burma and the Philippines, face low intensity conflicts by

    relatively large armed groups. The Moro Islamic Liberation Front in the Philippines may

    have 10,000 persons under arms, for example. Conventional military forces still have a

    role to play.

    Sources of Asymmetric Threat

    The most important source of asymmetric threat to the state in Southeast Asia today

    comes not from the aggressive actions of another country but from regionally and

    internationally networked terrorist groups.14 Before discussing this subject I would like to

    diverge slightly to discuss some new research on the root causes of terrorism.

    It is often argued by regional leaders that the root causes of terrorism are to be found in

    underdevelopment and poverty and/or U.S. policies in the Middle East (support for Israel,

    and the wars in Afghanistan and Iraq). I would say that while these factors may

    contribute to the mobilization of terrorists, they are not its root causes.

    For the sake of discussion I would like to draw your attention to the research findings

    published by Michael Mousseau and Audrey Kurth Cronin.15 Mousseau argues that the

    13Grange, Asymmetric Warfare: Old Method, New Concern 4.

    14James Wise, Australian High Commissioner to Malaysia, quoted by Leslie Lau, FPDA to focus on anti-

    terror tactics, The Straits Times, May 28, 2003 and Robert Hill, Minister of Defence, Regional Terrorism,

    Global Security and the Defence of Australia, RUSI Triennial International Seminar, National Convention

    Centre, Canberra, October 9, 2003, 1.15

    Michael Mousseau, Market Civilizations and its Clash with Terror,International Security , 27(3),

    Winter 2002/03, 5-29 and Audrey Kurth Cronin, Behind the Curve: Globalization and International

    Terrorism,International Security , 27(3), Winter 2002/03, 30-58.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    13/26

    13

    social origins of terror are rooted in the values and beliefs associated with the mixed

    economies of developing countries in a globalizing world.16 Mousseau draws attention

    to the prevalence of patron-client relations in developing mixed economies and the values

    and expectations these relations generate. Patrons provide goods, services and protection

    while clients provide labour and other forms of support. Globalization breaks this

    relationship. But it is not the clients those on the bottom rung of the economic ladder

    who lose the most. It is the patrons and their lieutenants who hold privileged positions in

    the old clientalist hierarchies. This is why leaders of terrorist organizations frequently

    come from privileged backgrounds.

    17

    Mousseau goes on to argue that Muslim rage over U.S. policies in the Middle East has

    deeper roots than just identification with Islam. He states: the underlying cause is not

    Islam but rather a deeply embedded antimarket and thus anti-American passion a fury

    that extends beyond the Islamic world and whose origins are not understood even by

    those espousing hatred for the West.18 Globalization is the cause because it not only

    erodes the patron-client relationship but introduces new values that are at odds with the

    values of clientalism a lack of empathy for out-groups, an emphasis on community

    over the individual, and an incomprehension for objective truth and individual

    innocence.19

    In a separate study Cronin takes a broad historical view of terrorism and argues that its

    main drivers were decolonization and globalization. The breakup of empires,

    decolonization and leftist anti-Westernism produced three waves of terrorism. The

    16Mousseau, Market Civilizations and its Clash with Terror, 6.

    17Mousseau, Market Civilizations and its Clash with Terror, 19.

    18Mousseau, Market Civilizations and its Clash with Terror, 22.

    19Mousseau, Market Civilizations and its Clash with Terror, 27.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    14/26

    14

    current wave of international terrorism, characterized by unpredictable and

    unprecedented threats from nonstate actors, not only is a reaction to globalization, but is

    facilitated by it, she argues.20 Globalization has produced a fourth wave of religiously

    inspired terrorism. But, she concludes, even though the newest international terrorist

    threat , emanating largely from Muslim countries, has more than a modicum of religious

    inspiration, it is more accurate to see it as part of a larger phenomenon of

    antiglobalization and tension between the have and nave-not nations.21

    I have made this slight diversion to illustrate that the root causes of terrorism cannot be

    eliminated quickly and the impact of globalization will continually be felt in Southeast

    Asia. We live in a region where Indonesia and the Philippines, not to mention Myanmar

    and Cambodia, could easily weaken and become failing states.

    Terrorism

    While there is no internationally agreed definition of terrorism, the United Nations lists

    three organizations as terrorist groups: al Qaeda, Abu Sayyaf Group (ASG) and Jemaah

    Islamiyah (JI). This forms the legal and normative basis for counter-terrorism by the

    international community.

    Al Qaeda

    During the period of the Soviet occupation of Afghanistan (December 1979-February

    1989) hundreds of Muslims from Southeast Asia were drawn to Pakistan where they

    received religious indoctrination and military training. Some even crossed over into

    Afghanistan and fought with the mujihadeen. A few high level al Qaeda operatives, such

    as Ramzi Yousef and Hambali, made their way to Southeast Asia to forge links with local

    20Cronin, Behind the Curve: Globalization and International Terrorism, 30.

    21Cronin, Behind the Curve: Globalization and International Terrorism, 35.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    15/26

    15

    militant groups and to offer training in terrorist techniques including explosives. Other al

    Qaeda operatives used Southeast Asia as a venue for planning terrorist attacks against the

    United States.

    During the Soviet occupation period, personal ties were forged between the leaders of al

    Qaeda and the Abu Sayyaf Group, Moro Islamic Liberation Front and Jemaah Islamiyah.

    When Southeast Asia jihadist veterans returned home some became active in local

    militant groups. More Southeast Asian recruits continued to be sent to Afghanistan after

    1989. The linkages between al Qaeda and local militant groups represented a new stage

    in the development of new terrorism in the region. New terrorism is a term used to

    denote the emergence of internationally networked mass casualty terrorist groups.

    The U.S. attack on the Taliban regime, the occupation of Afghanistan and the prosecution

    of the global war on terrorism has greatly degraded al Qaedas effectiveness and severed

    many of its effective links in the region. It is difficult to know whether al Qaeda

    maintains its own separate cell structure in the region.22 It seems likely that al Qaeda

    operatives have turned to professional terrorism as a career and have thrown in their lot

    with local militant organizations.

    Jemaah Islamiyah

    The most potent terrorist group in the region is Jemaah Islamiyah (JI); it pursues both a

    global Islamist and local political goals. JI is headed by an amir. He heads four councils

    with responsibility for governing; religion, discipline andfatwa.23

    Beneath this structure

    lies four mantiqis covering territorial administration.Mantiqi 1 covered Malaysia and

    22Hill, Regional Terrorism, Global Security and the Defence of Australia, 3, argues the links between JI

    and Al Qaeda are less clear.23

    International Crisis Group,Jemaah Islamiyah in Southeast Asia: Damaged But Still Dangerous, ICG

    Asia Report No. 63, Jakarta and Brussels: August 26, 2003, 11.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    16/26

    16

    Singapore; mantiqi 2 covered most of Indonesia; mantiqi 3 included Mindanao, Sabah

    and Sulawesi; and mantiqi four covered Papua and Australia. Each mantiqi was divided

    into districts (wakalah) and cells (fiah). The Malaysian cell established linkages with

    Kumpulan Militan/Mujahidin Malaysia (KMM).24

    The JI attempted to forge a regional coalition of like-mined groups under the name of

    Rabitatul Mujahidin.25

    Representatives from JI, MILF and militant groups from Aceh,

    Sulawesi, southern Thailand, and Myanmar reportedly attended the first meeting.

    Rabitatul Mujahidin met three times in Malaysia between 1999 and late 2000. The recent

    arrest of Hambali indicates that JI had cells in Cambodia and Thailand.

    A recent study of the JI by the International Crisis Group dated August 26 th 2003 states:

    New information suggests that JI was deliberately set up as a military

    organization and that the division into units known as mantiqis and wakalahs

    originally defined as districts and subdistricts was actually a territorial

    command structure of brigades, battalions, companies, platoons and squads. 26

    The ISG report notes that all senior members of JI trained in Afghanistan in the late

    1980s and early 1990s. It was from among these Afghan alumni that instructors were

    picked to set up a terrorist training camp in Mindanao from 1996-2000 in cooperation

    with the Moro Islamic Liberation Front. The ISG put the JIs strength at 2,000; the hard

    core may number between 300-500.27 The ISG Report also identified a JI special

    operations unit, Laskar Khos. Another disturbing feature of the ISG report is the

    24Zachary Abuza, Tentacles of Terror: Al Qaedas Southeast Asian Network, Contemporary Southeast

    Asia, 24(3), December 2002, 453-454.25

    Abuza, Tentacles of Terror: Al Qaedas Southeast Asian Network, 459.26

    International Crisis Group,Jemaah Islamiyah in Southeast Asia: Damaged But Still Dangerous, i.27

    International Crisis Group,Jemaah Islamiyah in Southeast Asia: Damaged But Still Dangerous, and Hill,

    Regional Terrorism, Global Security and the Defence of Australia, 2.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    17/26

    17

    identification of new terrorist groups in Indonesia as well as the linkages between JI and

    criminal thugs (preman).

    This abbreviated account points to a regional terrorist network that is able to recruit, train,

    raise funds and provide logistics support for operations throughout Southeast Asia. MILF

    cadres have been implicated in terrorist bombings in Indonesia. JI members recruited in

    Malaysia reportedly fought in Sulawesi when conflict broke out between Christians and

    Muslims.

    The JI network planned terrorist attacks on foreign targets in Malaysia and Singapore

    including diplomatic missions, U.S. service personnel, and a U.S. warship. Their target

    lists also included MINDEF HQ in Singapore, a radar near Changi Airport and the Caltex

    Oil Company offices. There were also reports that terrorists considered attacking the

    water supply system between Malaysia and Singapore in order to sow discord between

    them.

    Action by Malaysian and Singaporean security authorities in late 2001 and subsequently

    shut down the JI. But key fugitives remain loose. 28 This means that terrorist groups

    located outside Malaysia and Singapore could plan and execute terrorist attacks inside

    Singapore and Malaysia. Such terrorist attacks could be mounted by a combined force of

    JI and extremists from the MILF, Abu Sayyaf Group and other terrorist groups.

    Southeast Asia faces other transnational threats in the form of criminal syndicates and

    gangs who engage in smuggling small arms and traffic in people and illegal drugs.

    Southern Thailand and Cambodia have been identified as the source for much of the

    28Hill, Regional Terrorism, Global Security and the Defence of Australia, 3.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    18/26

    18

    small arms smuggling in the region including to rebels in Aceh. Small arms pass through

    Indonesia to the southern Philippines.

    Finally, I would mention the prevalence of piracy in Southeast Asia.29 This term is used

    loosely in the literature and includes criminal acts on the high sea as well as robbery and

    hijackings in ports and territorial waters. While most piracy appears local, there are

    notable instances when international groups hijack a ship, repaint and renumber it and

    sell its cargo in a distant port. There is at least one reported instance of GAM rebels in

    Indonesia hijacking a supply ship in the straits. As Malaysias Deputy Prime Minister

    noted recently, the maritime transport system has become particularly vulnerable to being

    targeted or exploited by terrorists.30

    III. FPDA and Asymmetric Threats

    All of this discussion now brings me to the matter at hand: the FPDA and asymmetric

    threats. The FPDA was formed in 1971 as a result of the exchange of bilateral notes

    between its five members. The FPDA was formed in a specific context: the withdrawal of

    British forces east of Suez, the end of confrontation with Indonesia, and withdrawal of

    U.S. military forces from mainland Southeast Asia.

    The core of the FPDA was IADS the Integrated Air Defence System, headquartered at

    Butterworth. The FPDA remains today the only functioning multilateral military

    arrangement in the region that is operational.

    What is remarkable is that the FPDA has survived for so long and slowly evolved in the

    process. There was a period when British naval forces were absent from air defence and

    29Matthew W. Flint, The Timor Sea Joint Petroleum Development Area and Gas Resources: The Defence

    Implications, Working Paper No. 13, Canberra: Sea Power Centre Australia, 2003, 28-30.30

    Quoted in Nik Amran Abdullah, Measures to protect shipping lanes from terrorism,New Straits Times,

    October 7, 2003.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    19/26

    19

    maritime exercises (Lima Bersatu) in the decade prior to 1988.31

    Australia moved from

    stationing aircraft at Butterworth and shifted to a policy of rotation. New Zealand ground

    forces were withdrawn from Singapore. In the late 1980s the FPDA was revived. The

    most recent development is the expansion from air defence to area defence.32

    Today we have been asked to explore how the how the Five Power Defence

    Arrangements might adapt to address asymmetric threats or consider options to build

    upon the existing cooperation between FPDA members to enhance their individual and

    collective ability to deal with emerging asymmetric threats.33 My instructions today were

    not to answer this question but to provide the background or scene setting for your

    syndicate discussions.

    In order to assist these discussions let me briefly address multilateral institutions that

    have security roles and how these roles have changed over time. This might provide some

    useful background for our consideration of the FPDA.

    The ASEAN Regional Forum (ARF) is the only Asia-Pacific wide security body. It has

    set itself the goals of building confidence, preventive diplomacy and elaborating

    approaches to conflict resolution. Although much progress has been made in confidence

    building measures, several key areas remain: a regional arms register and steps at arms

    control. A mechanism has been set up for the ARF to exercise preventive diplomacy but

    31Khoo How San, The Five Power Defence Arrangements: If It Aint Broke, paper presented to

    ASEAN Regional Forum Professional Development Programme, Bandar Seri Begawan, Brunei, April 23-28, 2000.32

    The FPDA ministers redesignated the HQ Integrated Air Defence System (IADS) to Integrated Area

    Defence System at a meeting held in Singapore, July 3, 2000.33

    According to Malaysias Defence Minister, Najib Razak, the [FPDA] ministers agreed we should look at

    non-conventional forms of threats, in particular global terrorism, piracy and illegal immigrants The

    ministers agreed that external threats in the conventional form have diminished. Najib also noted that the

    shift in emphasis to terrorism did not mean the FPDA will be involved in operational terms but we are

    looking at joint training, intelligence sharing and capacity building; quoted in Agence France Presse,

    Five-power defence group shifts focus to terrorism, June 2, 2003, found in SpaceWar.com.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    20/26

    20

    this has not been utilized. A regional center that could give early warning of likely

    conflict has yet to be established. The ARF has not moved to meet its third goal of

    conflict resolution because of the extreme sensitivity to sovereignty by China and other

    members.

    The ARF works closely with a track 2 body known as CSCAP Council for Security

    Cooperation in Asia Pacific. CSCAP is a non-governmental body consisting of the

    regions leading think tanks. It makes recommendations to senior ARF officials. A study

    of CSCAPs agenda over recent years indicates that it has become increasingly

    preoccupied with new security issues transnational threat. So too has the Asia-Pacific

    Round Table organized annually by ISIS-Malaysia. There is very little evidence,

    however, that this preoccupation has altered the ARF agenda which focuses on traditional

    threats.

    APEC the Asia Pacific Economic Cooperation forum was originally set up to

    encourage trade liberalization. It is not a security body per se but there is initiatives to

    have national leaders discuss security issues at APEC summits. Such discussions took

    place at the APEC summit in New Zealand in 1999 and were crucial for laying the

    groundwork for UN-sanctioned intervention in East Timor.

    ASEAN is not a security body either but it has slowly moved to put security issues on its

    agenda. At the recent 9th Summit in Bali, ASEAN adopted a Declaration of ASEAN

    Concord II that endorsed the concept of an ASEAN Security Community. Let me quote

    from this document:

    The ASEAN Security Community, recognizing the sovereign right of the member

    countries to pursue their individual foreign policies and defence arrangements and

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    21/26

    21

    taking into account the strong interconnections among political, economic and

    social realities, subscribes to the principle of comprehensive security as having

    broad political, economic, social and cultural aspects in consonance with the

    ASEAN Vision 2020 rather than a defence pact, military alliance or a joint

    foreign policy

    Maritime issues and concerns are transboundary in nature, and therefore shall be

    addressed regionally in holistic , integrated and comprehensive manner. Maritime

    cooperation between and among ASEAN member countries shall contribute to the

    evolution of the ASEAN Security Community

    The ASEAN Security Community shall fully utilize the existing institutions and

    mechanisms within ASEAN with a view to strengthening national and regional

    capacities to counter terrorism, drug trafficking, trafficking in persons and other

    transnational crimes; and shall work to ensure that the Southeast Asian Region

    remains free of all weapons of mass destruction. It shall enable ASEAN to

    demonstrate a greater capacity and responsibility of being the primary driving

    force of the ARF.34

    The Shangri-la Dialogue is an annual informal meeting of like-minded defence ministers

    from around the region brought together by the International Institute of Strategic Studies

    (IISS) based in London. The Shangri-la Dialogue has discussed terrorism and

    consequence management of mass casualty attacks. It is my assessment that the Shangri-

    la Dialogue took off because there was no comparable regional venue for defence

    34Extracts from paragraphs 2, 5 and 10, Declaration of ASEAN Concord II (Bali Concord II), October 7,

    2003.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    22/26

    22

    ministers or their representatives. ASEAN Defence Ministers, for example, do not met

    for substantial discussions on an annual basis as do many of their cabinet colleagues.

    The FPDA is one of a number of regional multilateral institutions contributing to regional

    peace and stability. It is set within an international and regional context where the

    definition of what constitutes security is being enlarged to include many non-traditional

    threats. These threats are overwhelmingly transnational, in that they affect more than one

    country, and find their origins in the actions of non-state actors. Modern day criminal

    syndicates and groups that sponsor new terrorism can shift their geographical base. They

    are hard to detect and deter. This raises the question how the FPDA might adopt to these

    changing circumstances as have other multilateral regional bodies.

    Transnational threats are dealt with by national government usually through a whole of

    government approach involving interagency committees or task forces. Many more

    organs of government are involved now engaged in this task (police, intelligence, foreign

    affairs, defence, immigration, customs, quarantine services etc.). National governments

    are very protective of their sovereignty. Yet they must cooperate with other states to

    address new transnational threats.

    In Southeast Asia the threat of new terrorism has generated many forms of cooperative

    responses. At the initiative of the Philippines, Malaysia, Indonesia and several other

    regional states have agreed to cooperate against terrorism. APEC, ARF and ASEAN have

    all adopted declarations of policy to counter terrorism. ASEAN and the United States

    have signed a Memorandum of Understanding. Australia and several countries have

    likewise signed an MOU on cooperation against terrorism.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    23/26

    23

    Let me suggest that new terrorism is the main threat to regional security. Consider the

    following scenarios:

    The targeting of FPDA assets including IADS HQ, naval ships and aircraft onFPDA exercises or in ports. Terrorists could employ car bombs, shoulder held

    surface-to-air missiles35 or explosive laden zodiac-type craft.

    The targeting of western businesses or interests in Malaysia or Singapore byterrorist groups using biological, chemical, or radiological weapons.36 How would

    the consequences of such a catastrophe be managed?

    The use of a tanker by a terrorist group as a mass casualty weapon or a weapondesigned to bring about economic dislocation as part of a broader campaign of

    destabilization.

    Terrorist groups targeting Singapore (or Kuala Lumpur) as an economic hubusing cyber war in order to achieve global effects.

    The attempt by Islamist terrorists to sow discord by focusing attacks andpropaganda on U.S. allies in the FPDA.

    Malaysia and Singapore bear the responsibility for reacting to these incidents and seeking

    cooperation from countries of their choice. All I would like to raise is the question of how

    35The Electronic Warfare & Informational Operations Association estimates that there are 500,000

    shoulder launched SAMs in circulation globally. U.S. intelligence estimates that 7,000 SAMs are on the

    black market and that 27 terrorist groups have acquired SAMs. Over the last two decades it has been

    estimated that between 29-40 civilian aircraft have been subject to SAM attack. See: Patrick Goodenough,Australia Mulls Terrorist Missile Threat to Airlines, CNSNews.com, September 5, 2003 and Associated

    Press, Missile fears for Bangkok airport, The Straits Times Interactive, September 8, 2003.36

    Australias Incident Response Regiment has conducted joint training in chemical, biological and

    radiological response with Singapore; Hill, Regional Terrorism, Global Security and the Defence of

    Australia, 5. According to the International Atomic Energy Agency, the number of nuclear material

    smuggling cases rose dramatically in Turkey, the Caucasus and Central Asia in 2001. During the period

    1993-01, more than a hundred attempts to smuggle nuclear material into Turkey were discovered. See:

    Representative Ellen Tauscher, Countering the New Asymmetric Threats, Blueprint Magazine,

    November 15, 2001, found at New Democrats Online, NDOL.org.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    24/26

    24

    if at all should the FPDA adjust its activities to meet these and other transnational threats.

    Should there be changes in how information and intelligence is handled and

    communicated? Should joint training activities and exercises be designed to incorporate a

    multilateral response in specified circumstances, such as counter-terrorism? What

    activities can be undertaken to improve capacity building counter-hijack, hostage

    recovery, consequent management, military law?

    IV. Conclusion

    Asymmetric threats are here to stay. They will be employed by internationally and

    regionally-based non-state actors, mainly criminal syndicates and terrorist groups. A

    military response alone is not the most effective way of dealing with such threats. A

    multidimensional integrated response is necessary and it should include a defence

    element.

    The rise of asymmetric threats and asymmetric warfare is taking place within the context

    of a broadening of the definition of what constitutes security by nation-states and regional

    organizations. In Southeast Asia the new security paradigm is one of comprehensive

    security.

    New threats to security are transnational in nature and involve the actions by non-state

    actors and sometimes the support of rogue states. The issue of transnational threats

    naturally has led some states to consider the role of the armed forces in meeting them.

    Southeast Asians are proud to note that since the foundation of ASEAN in 1967 no

    member of the organization has gone to war with another member. At the same time, the

    likelihood of state-on-state conflict is receding globally if not regionally.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    25/26

    25

    In these circumstances can the long experience of multilateral cooperation fostered by the

    FPDA be adjusted or refocused to meet these new challenges? Can the FPDA serve as a

    model for other regional security endeavours? Should the geographic scope of FPDA

    exercises be expanded to include the states of eastern Malaysia? Should the FPDA

    contemplate expanding its membership by including Brunei at some time in the future?

    I would now like to conclude by offering some thoughts on two issues to assist you in

    your syndicate discussions. These are drawn from the article written by Colin Gray cited

    earlier.37

    1. How do asymmetric threats work? Asymmetric threats work by:

    defeating our strategic imagination posing possible menaces so awful and awesome that countries dare not respond,

    at least not until actual experience provides incontrovertible evidence of the threat

    challenging successfully our ability to respond effectively acting against what appear to be our strengths.

    2. What factors should shape our response? Factors shaping our response include:

    Asymmetric threats cannot be predicted in the sense that we cannot protecteverything that is at risk.

    We tend to focus on the most recent event and project it forward. But theuncertainties are too great.

    Nevertheless we should be able to identify and therefore plan how to protectagainst the kind of threats that would do us most harm.

    37Gray, Thinking Asymmetrically in Times of Terror, 8-13.

  • 8/14/2019 Thayer Asymmetric Threat & Southeast Asia

    26/26

    26

    We need to be alert to the possibility that asymmetric threats can wreak theirgreatest damage through ill-judged measures of response that we choose to

    undertake.

    We need to identify and think hard about threats to which we lack obviousresponses.

    What do our adversaries value highly, and how can we threaten or hurt thosevalues?

    Thank you.